0% found this document useful (0 votes)
203 views29 pages

Çhapter 1 WMN

Uploaded by

mubasshiraq431
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
203 views29 pages

Çhapter 1 WMN

Uploaded by

mubasshiraq431
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 29
Basics of PCS and GSM CHAPTER 1 Syllabus Personal Communication Services (PCS) architecture, Global system for Mobile Communication (GSM) Architecture, GSM frequency spectrum, GSM radio aspects, GSM services, Supplementary services, GSM channel types, call processing in GSM Mobility Management : Location updates procedure, Temporary, Mobile Subscriber Identity, concept of roaming, Location area, routing area, tracking area, Network signalling, Personal Communication Services (PCS) Architecture. Introduction to GSI Characteristics of GSM Standard .ennnee UQ. Write the important features of GSM, 14 GSMS: ces, UQ. State and explain the three services offered by GSM system. 7 UG. State the various services offered by GSM standard. Describe these services in deta LSS Se. fency Bands . Uo. State frequency band, channel bandwidth, access method and type of modulation used in GSM, CSE fications for following parameter of GSM all interface : ua, Forward channel frequency, 2) Frequency spacing, Number of user per frame 4) Modulation technique [EETSSSS ERATE y four GSM air interface specifications. [I SEN=aSe CREME TOM Stucture. DEEEES EEE... label diagram of GSM architecture. [SELES USCA STATA ...... architecture and write function of each block. [IT SETSeeSS TACIT... Wireless and Mobile Network (MSBTE-OW — 4.6.1. MS (Mobile Station) Number Identities used in GSM ~ 1.6.14) 4.62, BSS (Base Station Subsystem) tions of BSC block of reonnactions @sM and using 8k ich snow thelr Inte ua, State f 1163 NSS (Network Switching Subsystem) se Ua. Explain function of HLR and VLR: ceo — ti [LER EES va. Explain function of HER units. MES Te 5 Ua, State function of VLR, HLR, AUC in GsM system. RIES ‘1g OMSS Operation and Maintonance SubsySIer™ Ua, Explain function of OMC units [ESET Ua. Describe the function of OMC in GSM Ee 4:7. Basic Rio Transmission Parameters In GSM 900. Ua. Write GSM Air interface specification forthe following P 1. Peverse channel frequency 2 Forward channel frequency 3. ARFCN number 5. TX/AX frequency spacing 4.8 Description of Call Setup Procedures nnn fs \Wite cal processing in celular telephone system. KITSEUERESa EMEA ua. Ua. Deserbe cll making procedure from mobile handset to landiine phone (PSTN) with neat timing diagram. LES ASA itustrate with the help of neat timing diagram, the process of call initiation from mobile handset to a landline phone (PSTN) using timing diagram. SSED SRS CAGES Ua, _ Illustrate the process of cal initiation from landline telephone to cellular phone with neat timing diagram. [ESSERE .. Ua. Describe call processing in GSM system with suitable diagram, [(USTEICSSaS3 FARNTETE UG. Illustrate the process of cal routing in mobile. i 7 c ae 9 communication system, SESS TNE 1.8.1. MS Registration in GSM Network. 1.8.2 Mobile Originated Cal... yarameters | 4, Modulation 6. Users per frame FTSEu=S ua. VQ. Describe the call processin 9 in cellular phone fo i it Pane 'phone for mobile originated call with timing diagram. 1.8.3 Mobile Terminated Call. UG. Describe process of mobile terminated call MSBTE = W-15, 3 Marks Ii 1.9 GSM Channels... 1.8.1 Logical Channels.. UQ. Draw GSM logical channel structure, 1.9.2 Traffic Channels ul SAT (MSBTE-New Sylabus w.ef academic year 2019-20) (06-15 ) ions ...A SACHIN SHAH Ventu® Wireless and Mobile Network (MSBTE-6th | 1 Basics of POS and GSM UO. Describe in deta GSM trac channels, [LSTA UG. List and describe diferent types of traffic channels (TCHS) provided In GBM. i AAT 4.8.3 Control Channels. UQ. State GSM control channels, Give Siinsdbna ol al lll Pree 15.6 Marko] ‘Mobility Management 1.10.1 Paging 1.10.2 Location Update... 1.10.2(A) MS Registration in GSM Network... 4.10.3 Handover Mechanism in GSM 3.10.4 Security in GSM (Authentication and Privacy In QM) .. 1.10.4(A) Authentication using A3 Algorithm... 4.10.4(8) Data Encryption using AS and A8 Algorithm, 4.10.8 Roaming... Network Signaling... 1.11.1 Um Interface . 1.11.2 Agg Interface ... 1.11.3 Alnterface 1.11.4 Interfaces used within NSS. Chapter End his chapter is divided into five parts SBTE-New Syllabus w.ef academic year 2019-20) (D6-15) Wlrech-neo Publications ...A SACHIN SHAH Venture m RE SERVICES (PCS) ARCHITECTUI (MSBTE-New Syllabus wef academic year 2019.20) (06-15) |ON 1.1 PERSONAL COMMUNICATI wireless access hy sal ivity The term PCS refers to the numerous vided throug! and personal mobility services provided 1 ovide cones terminal, This PCS system aims to provide ge and in any form. at any time, place and in any oo cs veloped. Man} are many PCS systems devel cs a fe sd to PSTN also. The examples z are connected to PSTN a Fi syst for mobile), systems are FSM (global system ae PDC (Personal Digital Cellular), 18-95 CDMA on ; ose There are two most popular PCS technologies. ria are cellular telephony, cordless and low tier system, -1. Tt shows PCS architecture, Refer Fig, Mobitty Debase Weng Transport Network Base Staton Controle Fig. 11.1 : The basic PCS network architecture Generally PCS i implemented in cellular structures, In digital cellular. ‘Systems, cell is of | hexagonal shape, PCS consists of MS (Mobile (Base Station), BSC (Base Station (Mobile Switching Centre) etc, Station), Bs Controller), Msc The details of the PCS architecture GSM architecture as GSM is also an example of PCs. system, are same as that of | 2, * GSM provi, bal System for Mobi, stands for Glol ul ai digital cellular technology Useq tee ice and data services. tis originally developed by ETSI (Bi ote standards Institute) in Europe to lie < roblems of the first generation networks, wees x standardization group established in 1 M818 t common European mobile telephone standar : ae GSM uses narrowband Time Division Mutiny he (TDMA) for providing voice and text baseg 'S over mobile phone networks, It's the first cellular system to use digital may schemes and network level architectures, Presently GSM supports more than on tllicn my subscribers in more than 210 countries trough world, USE of SIM : GSM makes use of SN Subscriber Identity Module) which is actualy Storage device and it is available in the form of su cards. It is removable and portable, Itstores followin; Subscriber identification umber Subscriber's information home network and cous! (iii) Private keys Gv) User: SPecific information etc. Prtaey of Data: All the data steams are xcvP® ; bee 7 Se MeeESSry privacy and security to the data ™ it is transmitted OWA t0 the cellular device only. “s improved spectrum efficiency. Wireless and Mobile Network (MSBTE-6th = IF) ational vom The facility of national and inte provided. & GSM maintains good specch quality 6 GSN is compatible wie ISDN, PSTN and otlor ne company services nw DY _1.4 GSM SERVICES UQ, State and explain the thre “gstem Lees $UQ. State the various services offered by GSM standard, } «Describe these services in detail, i DEG GSM Services 1.Teleservices can also be mise compatible f0 Hower services. e-services offered by GSM { | Data services! Bearer services services Suppleme Fig. 14.1 : GSM Services > 1, Teleservices © These services allows subscriber to use terminal equipment functions for communication with other subscribers. «I supports emergency call services, Videotex and Teletex services though they are not integral part of the GSM standard, > 2. Data services/ Bearer services + These services allow subscriber to transmit appropriate signals across user network interfaces. «It supports packet switched protocols and data rates from 300 bps to 9.6 kbps. New developments are going on to increase the data rate further. + Da can be transmitted in two modes : (i) Transparent mode : GSM network provides standard channel coding method for user data. 1 UQ. State frequency band, channel bandwidth, access UQ. List any four GSM air Danioa of PCS and GM ..Pg. No (1, ywarent mode 1 GSM peclal coding methods bued on particu! pvides dita wetwork p aw Interface, Supple norvicen ‘There services supplements the teleservices and are ‘offered! with basle televervices. “They are digital In nature, ‘Those services Include caller identification, call Forwarding, cnll waiting, multiparty conversations, and barring of outgoing (international) calls, among others, It-also includes SMS (Short Messaging Service) service is u toxt messaging service that allows sending and receiving text messages on your GSM mobile phone, Some of the supplementary services examples are : (i) Callconferencing (ii). Call waiting (iii) Call barring (iv) Call forwarding (vy) Number iden (vi) Advice of charge (ii) Closed user groups > 1.5. GSM FREQUENCY BANDS method and type of modulation used in GSM, i MSBTE - S-15, 4 Marks [i | UQ. State specifications for following parameter of GSM { air interface : 1) Forward channel frequency, 2) Frequency spacing, 3) Number of user per frame 4) Modulation technique { terface specifications, i MSBTE - S-18, 3 Marks It's frequency and time division system. Each physical channel have unique frequency and time slot number. GSM Triband frequencies are 900MHz, 1800MHz and 1900MHz. They are generally referred as GSM 900 and DCS 1800 systems. (MSBTE-New Syllabus w.ef academic year 2019-20) (06-15) [al rech-Neo Publications ..A SACHIN SHAH Venture cn a ae 1710-1785 Miz —~ Parameter, CO He 390-915 1805-1880MHz Sr.No. 1.__ | Uplink frequency He 935-960 K 2 y 75 MH 2. ‘Downlink frequency 35 MHZ Iz. 3,__| Bandwidth te Carrier spacing. [isn 45 MHz, Duplex channel spacing Number of time slots used pet channel [8 ey Sa Wavelength = 33cm 9, _| Transmission Data rate 270 kbps 270 kbps 10.__| Maximum BS power 55.dBm 43 dBm U1, | MSclasses 1.20 W (not implemented) T- 1 W (handheld) 11-8 W (catftransportable phone) | TI- 0.25 W (handheld) Ik 5 W (carftansportable phone) IV-2.W (handheld) V-0.8 W (handheld) pi 1.6 GSM ARCHITECTUI UQ. Sketch GSM TOM Structure, UQ. Draw label diagram of GSM architect UQ, Draw the GSM architecture and write UQ. Explain GSM radio subsystem, . - Weicesra ne ‘(Cescrsteoo Refer Fig. 1.6.1. Pubite networks BTS : Base Transceiver Station ee : Visitor Location Register AUC : Authentication Centre ALR: : Home Lo EIR: cation Register aie Equipment Identity Regist? ech. 0 Publications ..a SACHIN SHAH Ver™* Wireless and Mobile Network (MSBTE-th ~ IF) Basics of PCS and GSM ...Pg. No. (1-7) ‘© GSM architecture shows various functional entities and three main subsystems. 1, BSS : Base Station Subsystem 2, NSS: Network and Switching Subsystem OSS : Operational Subsystem # MSis also a subsystem, but generally considered as an integral part of BSS. «The BSS is also known as radio subsystem interlinks and manages links between MS and NSS. It is comprised of many BSC (Base Station Controllers). «NSS controls all the switching functions of the system, It also supports communication between MSCs (Mobile Switching Centre) with other networks like PSTN ISDN etc. ‘© OSS manages operation and maintenance of GSM. It also administers the monitoring and controlling operations in the system, Actually in GSM interaction between the subsystems can be categorized 1. Operational: Provides transmission and reception paths between NSS, BSS, MS and subscriber. 2. Control : Manages all the traffic handling activities of the operational part and maintains, ‘modifies and controls the traffic related functions. «Refer Fig. 1.6.2 which shows interconnection between various subsystems. These subsystems are explained in 1. BTS ‘© It consists of an antenna equipment responsible for transmission and reception of radio signals. Generally it uses directional antennas. * The transceiver (TRX) is the central unit of the BTS. It manages links between maximum of 8 MSs with the use of single pair of frequencies. (8 MSs are handled at the maximum because in GSM, each cartier is divided into 8 time slots). It also has very important device known as TRAU (Transcoder Rate Adaptation Unit). TRAU performs encoding and decoding of the speech and rate ‘adaptation funetion of the data. Multiple BTSs are connected and controlled by BSC. Some of the BT'Ss are co-located at the BSC and others buted and physically connected rowave links or may be may be remotely di to the BSC with the use of by dedicated lease lines. 2. BSC tis a high quality switch. It controls several typically hundreds of BTSs. The mobile handovers between two BTSs which are under control of the same BSC are handled by the BSC itself and not the MSC. This reduces burden on the MSC. It provides cell configuration data and control of RF power levels in BTSs. ‘The BSC assigns free radio channels in the TRX for the link to the mobile station. BSC is also responsible for maintaining the radio path ‘between MSs during the call and disconnection of the path when the call'is over. xxplain function of HLR-units. “ MSBTE - S-16, S-17, W-17, 1 Mark BSS forwards the signals to NSS. It consists. of main switching functions, various databases and mobility management units. It manages the communication between GSM network and users from other networks like PSTN. The main unit of NSS is MSC (Mobile Switching Centre). ; Funetions performed by MSC are : 1. All the necessary switching functions required by MSs located in MSC area are performed by MSC. (MSBTE-New Syllabus wef academic year 2019-20) (D6-15) [Bl rech-neo Publications ..A SACHIN SHAH Venture 2, VLR BT Wireless and Mobile Network (MSBTE = the database of local 1 subscribers When ommunicates with other MSCs i 2 Mc + his opus il rs the network, s like subscriber enters ; as aan 3, It also communicates withthe other networks svpsaer te amine MS © te MSC a | Bie * ndergoes repistrtion process es follows. ae ntifies that MS belongs to other Msc 4. Tt always tracks the location of the sul ve i ide that to camy out the necessary handover @ VLR area. inl idemtifies and communicates with Mg, Sear wee mcs (ii) VLR then identifies an 6. Call routing functions and echo control functions are also performed by MSC. «There are five functional entities associated with the MSC. They are : HLR : Home Location Register VLR : Visitor Location Register EIR : Equipment Identity Register HLR in its home network. (i) VLR constructs the GT (Global Title) from IMs 0 that it can allow communication between VLR and Home HLR. : (iv) VLR generates. MSRN (Mobile Subscribe, Roaming Number) to allow MS to use the network when in roaming. 2 (v) MSRN is sent to home HLR also. AUC: Authentication Centre GMSC : Gateway MSC VLR stores : (i) MSRN Gi) TMSI (iii) Home location of the MS > 1 ALR * HLR is the database of permanent subscriber Gv) Supplementary services data of MS information. (vy) MSISDN (vi) IMSI * It contains user information like address etc., account (vii) GT status and preferences, (viii) Local MS identity if used * There are two types of information stored in HLR, VLR works in associati Te Saieeie ‘sociation with HLR and AUC, boas 2. Mobile information a {is the database of all the legitimate, fraudulent and faulty MSs. It keeps track of all the valid and invalid mobile equipment in the area, * Tt stores IMEI provided by the Functions performed by HLR are : 1. Identification : It stores IMSI and MSISDN (Mobile Station International Subscriber Directory Number) are used in call routing equipment m between MSC and particular MS. Using these eee ‘unique numbers particular MS js identified, > 4 auc 2. Subscriber service provision ; It ° Wis + It provides 's the database that contains i se information about the offered services like Keys for each subscriber and if eee teleservices, bearer services or suppl ‘ates security plement Telated paramet services. otf ie ters for Protection Purposes, 3 VLR address + It is needed when MS is in roaming, These are temporary data, tt aten | « . provides cipher keys, eo For carrying out authent Wireless and Mobile Network (MSBTE-6th — IF) Basics of PCS and GSM...Pg. No. (1-11) > 5. GMSC «All the calls to the GSM network are routed through GMSC. It first identifies the right HLR and authenticates it other networks and provides © Ttalso communicates gateway function for external network communication with GSM network, YB 1.6.4 OMSS : Operation and Maintenance Subsystem UQ. Explain function of OMC units, 1 1.7 BASIC RADIO TRANSMISSION PARAMETERS IN GSM 900. JQ. Write GSM Air interface specification for the following : parameters: 41, Reverse channel frequenc 2, Forward channel frequency 3, ARFCN number 4, Modulation: 5, Tx/Rx frequency spacing a 6 Wena as Table 1 Fi technicians. elements. PST | Puan T specticnions UQ. Describe the function of OMC in GSM. : SITECETAENIST || Forward channel frequency | 935 ~ 960 MHz There are three functional entities mainly in OMSS. Reverse channel frequency | 890-915 MHz Functional Entities in OMSS ARFCN Number 0 to 124 and 975 to 1023 Tx/ Rx Frequency spacing | 45 MHz. Fe 5 eal meneoemen oyna ‘Tx/Rx Time slot spacing _| 3 Time slots 2. Configuration management ayetem Modulation Data Rate 270.83 kbps 3, Software management system Frame period 4.615 ms 1.6.5 : Functional Entities in OMSS Modaltion 0.3 GMSKS > 1. The Fault Management system ‘Users per: finan: . It invokes alarms from the BSS elements when faults || Time slot period 576.92 us ‘occurs, These faults are then resolved by software or by || Channel spacing 200 kez yi as cannot eee Interleaving delay(maximum) | 40 ms + This functional unit is for installation and maintenance || Voice Coder Bit Rate 13.4 kbps of the software of the newly setup BSS network || Reverse and Forward Channel | 25 MHz Bandwidth ‘© It also manages hardware inventory list and changes |{~ operation parameters like frequencies of BTS etc. Bit period 3.692 ps > 3, ‘The Software Management system Frequency deviation 67.708 kHz. ‘This functional unit is used to install new software or || Slow frequency hopping 217 hops per second updates and manages the software inventory lists. (MSBTE-New Syllabus w.ef academic year 2019-20) (D6-15) [Bal rech-Neo Publications A SACHIN SHAH Venture Network (MSBTE-6th IF) f call L SETUP Illustrate the process oF mre SEU Ge | felephone to cellular phone with neat timing diagram, i Ua. Describe call processing in GSM systern vith suitable : diagram, MSBTE - S-17, 4 Marks Ug. Illustrate the process of call routi Eee La 6 Marks UQ. Write call processing in cellular telephone system. 1. Describe call making procedure from mobile handset | to landline phone (PSTN) with neat timing diagram. i TSCA | be divided in three different parts. 1. MS registration in the GSM network 2. Mobile originated call 3, Mobile terminated call VQ, Mlustrate with the help of neat timing diagram, the process of call initiation from mobile handset to. ; landline phone (PSTN) using timing diagram. 2A 1.8.1 MS Registration in GSM Network Refer Fig. 1.8.1, it shows typical flow diagram of MS registration in the GSM network. He ee ee es Channel eewest, | channel [_enRACH | Tequest Channel command Activation acknowiedgment socon | SOCCH assignment |,_essignment Location Update request! Location CTMSTLAIy “| UPdate request | Location ) update request Location voor ES sn reaen User a authentication | *t#hentication | authentication IMSI and user [ata request |, data reauest |, data request }eCata request Ms User Authentication Authentication parameter comparison Senet and new LAl and Tista Acknowldgement ‘ssignment 1 new LAL and TMS? }—_S2C0H lease ee wease| cae : Wireless and Mobile Network (MSBTE-6th When the mobile is switched on it first looks for the cartier on which BSS is transmitting the broadcast channel. This is done by measuring the received power of all 124 carriers present in the GSM system. This ts because carrier containing broadcast channel is transmitted at high power compared to others Next MS finds TSO of broadcast channel so that it ean identify FCCH burst. Then in TSO of the next frame MS finds out Synchronization burst for identification of BSIC and REN. MS decodes information carried by BCCH, It contains neighbouring cell identification, cell global identity (CGI: a sequence consisting of country coxle, mobile code, location area code, cell identity etc.) the number of common control channels avaitable in the cell, the maximum power that ean be used during call set up process etc. this finishes passive activation of MS If the Location Area Identity (LAI) sent by BS differs from the latest one which is stored in MS then registration takes place. Location updating is also necessary for monitoring MS"s current location, MS registration process ‘Once the mobile is switched ON, it sends the channel request on RACH required for registration process to BSC through BS. BSC commands BS to allocate free SDCCH. BS acknowledges this command and informs MS about this SDCCH on ACGH. ‘MS now uses SDCCH to send location updating request to BS. This request contains type of location update required, TMSI and LAI. This request is carried to VLR through BS-BSC-MSC-VLR. If the user's TMSI already exists in VLR, it updates his data about his activity. If the TMSI is not available with VLR then LAI sent by user is decoded, his IMS and data required for authentication is identified with the help of last VLR served, But if previous VLR also does not have necessary parameters then MSC request MS to send IMSI on SDCCH. Once it is received VLR communicates with home HLR and MS is authenticated. Now this information is updated in VLR. After this new user parameters are set. They are TMSI, LAI. These parameters are updated in HLR and VLR. Acknowledgement from the MS is then received. SDCCH channel is then released and now MS is ready for call set up. (MSBTE-New Syllabus w.ef academic year 2019-20) (D6-15) Basi YW 1.8.2 Mobile Originated Call UQ Describe the call processing In cellular phone fo mobile originated call with timing diagram. ‘© Fig, 1.8.2 shiows mobile originated call to PSTN. After rogistration once the MS is allocated with SDCCH, MS issues CM. (Connection Management) request to MSC. ‘This consists of the type of service MS wants to invoke. © Once the CM request is received based on location update information, if needed MSC will invoke ‘authentication process. ‘* Upon reception of authentication response from MS, MSC starts ciphering of voice and data for encryption ‘and decryption purpose. For this MSC passes cipher key (Ke) to BSS. BSS then instructs MS to start ciphering, ‘+ MS then generates cipher key (Ke) independently and it is not sent on air. Only information regarding completion of ciphering at MS is sent to MSC through BSS. ‘+ Now MS sends call setup request to MSC. This request contains all information required for call set up like dialled number etc. © Upon reception of all the required necessary information by MSC, it sends MS a call proceeding message. After that connection circuit between MSC and MS is freeze by sending the assignment request by MSC to BSS. ‘© BSS then send assignment command message to MS and instructs it move from SDCCH to TCH. FACCH will now carry all control signals hereafter. © MS sends assignment complete message to MSC through BSS indicating that it has moved to TCH. © Once MSC receives assignment complete message, it sends IAM (Initial Address Message) to PSTN network, * PSTN then sends ACM (Acknowledgement Message) indicating that destination phone is ringing, ‘© This is informed to MS by alerting message. * Once the called party picks up the phone ANM (Answer Message) is sent to MSC. MSC initiates connect message to MS and MS respond this by an acknowledgement, + Now the call is set up. Tech-Neo Publications ...A SACHIN SHAH Venture Basics of PCS and GSM i a & VLR : (S0CCH) CMsorice request |__| {service typeof mobile | Complete ayers nfo originated call) (CM service request) ‘Authentication request ‘Authentication (Cipher key KC) response [—_____| +} Cipher mode command gm commana peng ode compete | phernads compe i Sep dado) I Call proceeding Moca TCH an ron quae [Aas commana [Asonmen compete” tus oven Yes) | "sigan compe Tha {ea adtess messoe) iz : ACM Alerting acknowledgment message) i“ /ANM Connect {answer message) Coneet acknonage Fig. 182 : Mobile originated call %® 1.8.3 Mobile Terminated Call TAM (nitial Address Message) is received by GMSC. This IAM contains MSISDN (Mobile Station ISDN Number which means the Directory Number) ofthe called paty (MSBTE-New Syllabus w.e.f academic year 2019-20) (06-15) (rech-neo Publications ...A SACHIN SHAH Venture: Wiel and Mobile Network (MSBTE-6th ) * Once HLR receives MSISDN then it retrieves (Provide Roaming Number) request along with IMSI to the MSC, MSC then allocates MSRN (Mobile Station Roaming Number) form the available pool, MSRN is temporary number. MSC sends it (o GMSC through HLR. Basics of PCS and GSM ...Pg. No. (1-15) IMSI of that subscriber and forwards the PRN _ 5 oe w& & BSS. GMSO | MS VLR fe) i Cs —____| TAM —a SAS AR (MSAN)) Spa aoe a, Paging response Complete layer 3 into (paging response) Ciphering Mode command f ‘Setup coool Assignment complete | | 2 ACM ACM | a Connect Acknoledge rita ean amd cl Tal rech-Neo Publications ....A SACHIN SHAH Venture (MSBTE-New Syllabus wees academic year 2019-20) (D6-15) 41.9 GSM CHANNELS "= Types of channels the allocated M_ with ied to the pool. ja BSS using PCH. ion area to which Now GMSC forwards the TAI MSRN to the MSC. MSRN is return MSC sends paging request to MS vi This paging request contains local subscriber belongs. paging request MS requests for In response [0 that immediate done by BSS. And now MS d then sends the paging After receiving the channel on RACH. assignment of channel is moves to allocated SDCCH an‘ response to MSC through BSS. MSC the commands for cipherin 1g. MS receives this 's Ke on its own and send cipher complete and generates command to MSC through BSS. Then MSC generates set up message wh calling party's number and bearer capabilities etc. MS generates call jch contains Upon reception of set up message, confirmed message which indicates that it has all the necessary information required for the call As soon as MSC receives call confirmation message, it starts assignment process. It comprises of assignment request message from MSC to BSS and allocation of TCH by BSS to MS. Hence further Signaling will be using TCH and FACCH. ‘Once MS is moved on TCH it starts ringing, and sends the alerting message to the MSC. MSC then forwards acknowledgement message (ACM) to the PSTN via Msc. Once the called party picks up the phone, connect message is given by MS to MSC and then MSC sends ANM (answer message) to PSTN to which PSTN responds by connect acknowledge message. Then call is established. (1). Physical channels (2) Logical channels 1.9.1: Types of GSM channels Fig. «= physical Channels ‘The combination of ARFCN and TS (time slot) known as the physical channel for GSM. One RF channel will support eight physical channelsj time slot zero (TSO) through seven (TS7). Each physical channel can be mapped into differe: logical channels. ‘This can be done at different times i.e. specific tim slot or frame may be used to carry traffic data, contr data or signalling data. %_1.9.1 Logical Channels 5F Two types 1, Traffic channels 2. Control channels GSM logical channels eee I a Control channels (ccH) Full rate Halfrate Broadcast Common Dedicated control. control contol channel channel channel Fig, 19.1(a) : Types of GSM logical channels (MSBTE-New Syllabus we,f academic year 2019-20) (06-15) &) Tech-Neo Publications ...A SACHIN SHAH Ventur® Wireless and Mobile Network (MSBTE-6th — IF) GSM Logical channels Traffic channels Broadcast channels, Fullrate Hall TCH = TCH ate te | BCCH FCCH SCH Basics of POS and GSM ...Pg. No. (1-17) Signalling channels Common Dedicated control control channels channels Downlink Uplink Slow Fast PCH AGCH RACH SACCH SDCCH FACCH TCHIF : Traffic channel full rate BCCH : Broadcast control channel ‘SCH : Synchronization channel AGCH : Access grant channel SACCH : Slow associated control channel FACCH : Fast associated control channel FCC! ‘TCH/H : Traffic channel half rate : Frequency correction channel PCH : Paging channel RACH : Random access channel SDCCH : Standalone dedicated control channel Fig, 1.9.2 : Logical Channel structure of GSM % 1.9.2 Traffic Channels UQ. Describe in detail GSM traffic channels. & Ce - UQ. List and describe different types of traffic channels | (TCHS) provided in GSM. «They are used to carry user data or speech on forward and reverse links. ‘Speech [— Full rate (22.8 KB/s) L_ Half rate (11.4 KB/s) Trafic channels — i (cH) [— 9.6 KB/s nd 4.8 KB/s _ 2.4 KBis Fig. 19.4: Traffic channel structure > — @ Full rate traffic channels ‘+ Formats and the frame structures used on both the links al ‘User data is transmitted within one TS per frame, ns ai + TCH data may not be sent in TSO time slot as it is | * 26 frame of TDMA frame is zero if TCH full rate is reserved for control signalling data. used. TCHI/FS (full rate speech channel) * They can be further categorized as eels © Fullrate traffic channels 1 Tuite L9.1 s Types of fll rate TCH ©. Half rate traffic channels St (Name of the ful | Type ot sana pera) No.| raleTCH | camled | 1. |(TCHIFS) full rate|Digiized —user| 22.6kbps with GSM speech channel | speech encoded| channel coding addon ()) Full ate (TCHIF) at 13kbps 2 /(TCHF96) Ful rte] Userdata | 22.8 kbps with FEC (i) Half rate (TCHIH) data channel for 2.6 (forward Error Correction) Fig. 1.9.3 : Types of traffic channels eS ees eneon Gee (MSBTE-New Syllabus w.e academic year 2019-20) (D6-15) Brech.neo Publications ...A SACHIN SHAH Venture Basics of PCS and GSM ...Pg. No. (1-18) sTE-6th = IF) Data rate Wireless and Mobile Network (MSS | Name ofthe full | Type ct sional No.| rate TCH cared 3. | TOMS, Ful rte | Use data data chanel or 48 (Foard Err Corcton) [sos coding ation to. GSM. lee a Tironea) Fura] user data |228Kbps win FEC (Forward Eror Correction) data channel for 24 iss coding action to GSM. we 19.5 Control Channels UQ, State GSM control channels, Give functions of each 208 Kops with FEC (A) Broadcast control channels (B) Common control channels channels (C) Dedicated control > Gi) Half rate traffic channels > (A)Broadcast Control Channel (BCCH) # Userdata is mapped on the same TS (time slot) but sent rent frames. It is forward control channel with time slot Tso . 2 allocated to it. « Itis simplex channel and its functions are = Table 1.9.2 : Types of half rate TCH © Itserves as beacon channel to locate nearby mobile. Ss. | Name cf the halt | Type of signal Data rate - a izatic i [t Es nae ‘©. It provides synchronization for all MS in same cell. a © Rarely monitors for received power of MS that belongs } 4 | (TCHHS) Half rate | Digitized user | 11.4 kbps with GSM to neighbouring cells so that handover decision could || smecnehanel | spect channel coding be taken. | encoded at addition 7 © Three types : Refer Fig. 1.9.5. | | ea types : Refer Fig. 1.9.5. | 2 | (TOHHE.8) Halt | User data 11.4 kbps with FEC | rte data channel (forward error | | tor A8kbps correction) coding | adtition to GSM 3. | (TCHH24)Hal | User data 11.4 kbps with FEC ate data channel. (forward error = i for 2.4 kbps correction) coding errno dation to GSM j Fig, 19.5: Broadcast channel structure Control multitrame = 51 TOMA frames. a — 235 ms 2/3) 415]6]7]e[o[to}1}t2)ta)ta] S]s}sjelelciclclclelslelcle : FOCH burst (@CH) SCH burst (CH) BCCH burst (BCH) = PCHIAGCH bu ile rst (COCH) =omon[a oe (a) The cont ) The control channel multi-frame for forws Fig. 1.9.6 Contd... v4 link TS0 lew Syllabus wee academic year 2019-20) (06-15) Wireless and Mobile Network (MSBTE-6th — IF) Control multiframe = 51 TOMA frames, Basics of PCS and GSM ...Pg. No. (1-19) 235 me 6 R t]2]s]4]s Alri Ri RIA R R:: Reverse RACH burst (CCCH) (b) The control channel multl+frame for reverse link TSO Fig. 19.6 © Broadcast control channel (BCCH) © Frequency correction channel (FCCH) * Synchronization channel (SCH) + BCCH data provides inform: © BCCH data contains : L n needed to set up call Call and network identity 2. Operating characteristics of the cell (current control channel structure, channel availability, situation of congestion). 3. _ List of currently engaged channels in the cell + Refer Fig. 1.9.6(a) and (b), it shows the control channel frame for forward and reverse links. * Frame 2 to frame 5 carries BCCH data on forward link, Frequency correction channel ‘© It occupies first frame in TSO and it is repeated after every 10 frames in control channel multi-frame. ‘+ Itcarties the frequency information so that mobile unit can synchronise its local oscillator’s frequency with the base station frequency. Fig. 1.9.7 shows typical FCCH burst. carting = Tall Gyod bit soquatan See es Tall aru Be | Petttooumres TTS Se 3 142 3 825 =158.25 le Fig. 1.9.7 : FCCH burst © synchronization channel (SCH) * Ittakes the next to FCCH frame position in the control channel multiframe time slot TSO. It is sent once after every ten frames in control multiframe. * It provides signalling data useful for synchronism between MS and BS. (MSBTE-New Syllabus w.e academic year 2019-20) (D6-15) © The frame number (FN ranging from 0 to 2715647) ‘long with Base Station Identity Code (BSIC) is sent in SCH burst, BSIC is unique for each BTS. © When the mobile unit is far away (maximum 30 km) from the BS, it becomes necessary to adjust its clock with the BS clock to reduce timing errors and SCH burst signal is used to carry this information. Fig. 1.9.8 shows SCH burst. i rel |Geara Bi [Bt [eas : Fig. 19.8 : SCH burst > (B) Common control channels © Itoccupies TSO of every GSM frame. * There are three types of CCH. Refer Fig. 1.9.9. Types of Common Control Channels (}) Paging Channel (PCH) (ii) Random Access Channel (RACH) (i) Access Grant Channel (AGCH) Fig. 1.9.9; Types of control channels > (i) Paging channel * It is used to provide paging signals from BS to all MS in the cell. © It carties the notification information regarding the call originated from PSTN, * The paging message is generated by IMST of the target subscriber and the acknowledgement request from the ‘mobile unit which is sent on RACH on reverse link. + It may carry the cell broadcast ASCII text messages to all the subscribers when used in SMS feature. [ea rech.neo Publications A SACHIN SHAH Venture a Wireless and Mobile Network (MSBTE: (i) Random Access Channel (RACH) Iti reverse link channel and occupies TS0 of the GSM frame and caries acknowledgement messages. by ‘mobile units It also carries the call set up requests generated by subscriber units. Access scheme used by RACH: slotted ALOHA. At the BTS cach frame will accept the RACH transmissions from the mobiles during TSO. The base station responds to the RACH transmission by allocating a channel and a Stand-alone Dedicated Control Channel (SDCCH) for signalling in the presence of a call. The connection is confirmed by the base station over the Access Grant Channel (AGCH). ‘The RACH burst has longer guard period to protect for burst transmission from Mobile station that does not mow the timing advance when it first accesses the system. The additional guard time allows @ distance upto 35 km between base station to mobile station. Fig. 1.9.10 ‘shows the Random access burst. +} tss2s te a Tai Syreronizaton | Coded | val) [Adon Ua bts | "sequence | Data'| ots |e tie 3 ai a rer (0.577 ms) Fig. 1.9.10: Random Access Burst (iii) Access grant channel (AGCH) ‘The AGCH is used by the base station to provide forward link communication to the mobile. It carties data that instructs the mobile to operate in a specific ‘channel with a particular dedicated control channel, Ik is the message sent by the base station before a subscriber is moved off the control channel, ‘The AGCH is used by the base station to respond to RACH sent by the mobile station in the earlier CCCH frame. (C) Dedicated Control Channels (DCCHs) ‘The Dedicated Control Channels (DCI picture after a call is established, The d channels are bidirectional, Hs) come into ledicated contro} Year 2019-20) (06-15) J the reverse link: ere are three different dedicated control channel, Th ‘They are : ‘of Dedicated Control a ‘Channel alone Dedicated (Sent Channel (SOCCH) | {ll Slow Associated Control ‘Channel (SACCH) (li) Fast Associated Control ‘Channel (FACCH) Fig, 1.9.11 : Types of Dedicated Control Channels () Stand-alone Dedicated Control Channels (spccH) The Stand-alone Dedicated Control Channel (SDCCK) is allocated for every mobile station. It contains the signalling data that follows tte connection of the mobile with the Base Station (B9), prior to the allocation of TCH by the Base Station (Bs) to the MS, It guarantees that the Mobile Station (MS) and bas station (BS) will remain connected, The Base Station and Mobile Switching Centre will verify subscriber unit and assign the needed Tesources to the mobile. This channel that accepts the newly completed call from the BCH. It holds the traffic while waiting for the base station to assign a TCH channel, ‘The SDCCH is also used to transmit authentication and alert messages as the mobile synchronizes. itself with the frame structure and waits for TCH. SDCCHs can be assigned their own physical channel Also they can occupy the TS0 slot of the BCH if thet is low demand for BCH or CCCH traffic ® Slow Associated Contro! Channel (SACCH) {tis elated to traffic channel ot SCCH On the forward Tink it is changing information like : 0 Send regularly 1 Seat Felirs 4 ° Transmit power level, i : si82K o © Specific timing advance instructions for each uset- | TS aeasimessges, '€0 Publications ...A SACHIN SHAH Venture ( Wireless and Mobile Network (MSBTE-6th — IF) On the reverse link carries information about © Received signal strength, © Quality of TCH and BCH © Measurement results from neighbouring cells, It is used to inform the base of power measurements mode by the mobile of signal strength in the adjacent cells, It is transmitted during the 13" frame (and on the 26" frame when half rate traffic is used) of every dedicated control channel multi frame. SACCH exchanges control information between base station and mobile station during a call or call set up. (ii) Fast Associated Control Channels (FACCHs) FACCH carries important messages. It is used for exchange of time critical information between the mobile and the base station during the progress of the call. ‘The FACCH is assigned whenever SDCCH is not dedicated to a user and there is an urgent message like hand-off request. ‘The FACCH transmits control information by stealing capacity from the associated traffic channel. It is done by setting two special bits called stealing bits. In the TCH forward channel burst. If a stealing bit is set, the time slot contains FACCH data for that frame. RPE ara DH 1.10 MOBILITY MANAGEMENT SE ia Basios of PCS and GSM ...Pg. No. (1-21) Mobility management in GSM can be categorised in 4 sections namely paging, location updates, handoff mechanism and roaming. 1101 1.10.2 Paging For mobile terminated call, location of the mobile is important. This is done with the paging process, ‘The paging message is sent to the MS by BSS via paging channels. It includes the IMSI number. This ‘message may include the information regrading the channels the MS needs in case of the call. To optimize the cost and response time the paging starts at the location of the MS which is recorded in HLR. This location is continuously updating. For this location tacking various algorithms are present. Location Update It is important in finding out the location of the powered on MS in GSM network. In case of mobile terminated calls or SMSs, it is important. This location information is stored within the HLR and VLR. ‘When the MS is in OFF condition, explicit IMSI detach does the work of location update. IMSI detach is similar to HLR data. If the MS is out of coverage area implicit IMSI detach helps in location information update, (MSBTE-New Syllabus we academic year 2019-20) (D6-15) [Bl rech.weo Publications ..A SACHIN SHAH Venture Basics of PCS and GSM No, 1. W® 1.10,2(A) MS Registration In GSM Network ec 0 ws typical flow diagram of MS registration in the GSM network. Refer Fi 1, it shows typical flow diagram of MS registration ig. 1.10.1, it shows typica ‘Authentication parameter comparison us ors ase] Channel request Channel en RACH request Channel sclvation command ‘tivation acknowledgment ‘sDoCH assignment Nooaten Tas update request] Location = L anon request cation (TMSI,LAD, | update request, update request update request. User eet von | IMStand user User | authentication | authentication | "ata request authentication | “data request |, data request feat reauest_| ata request lessiareern | Inst User Authentication HLA Parameters and dw LAL and TMSI assignment Acknowidgement new LAI and TMSI SOCCH release (coraFig. 1.10.1 : MS registration in GSM network 1. When the mobile is switched on it first looks for the carrier on which BSS is transmitting the broadcast channel. This is done by measuring the received power of all 124 carriers present in the GSM system. This is because ‘carrier containing broadcast channel ig transmitted at high power compared to others, 2. Next MS finds TSO of broadcast channel so that it can identify FCCH burst. Then in TSO of the next frame MS finds out Synchronization burst for identification of BSIC and REN, 3. MS decodes information c: neighbouring cell identification, cell global identity (CGI: a sequence consisting of country code, mobile code, location area code, cell identity etc.) the number of common control channels available in the cell, the maximum power that can be used during call set ¢ Process ete this finishes passive activation of Mg ied by BCCH. It contains (MSBTE-New Syllabus 4. If the Location Area Tdentity (LAN) sent by BS diff from the latest one which is stored in MS th ‘eeistration takes place, Location updation is a necessary for monitoring MS"s current location. co MS registration process Once the mobile is switched ON, it sends the chant pauest on RACH required for registration proces BSC through BS. BSC commands BS to allocate free SDCCH. 8 acknowledges this command and informs MS abo this SDCCH on ACGH, MS now uses SDCCH to send location pda Fequest to BS. This request contains type of locati Update required, TMST and LAL This request is ca BS-BSC-MSC-VLR. Wireless and Mobile Network (MSBTE-6th —IF) Basics of PCS and GSM ...Pg. No. (1-28) ‘Ifthe user's TMSI already exists in VLR, it updates his data about his activity. If the TMST is not available swith VLR then LAI sent by user is decoded, his IMSI and data required for authentication is identified with the help of last VLR served. But if previous VLR also does not have necessary parameters then MSC request MS to send IMSI on SDCCH. Once it is received VLR, communicates with home HLR and MS_ is authenticated. Now this information is updated in VLR. ‘© After this new user parameters are set, They are TMSI, LAL These parameters are updated in HLR and VLR, Acknowledgement from the MS is then received. ‘© SDCCH channel is then released and now MS is ready for call set up. Handover Mechanism in GSM TGQ. Explain various types of handoffs in GSM network. GQ. What are the different types of Handover in GSM ? Explain in detail Intra-MSC handover, GQ. Discuss various types of Handoffs in cellular networks BW 1.10.3 «There are two basic reasons of the requirement of handovers.. 1. The MS moves out of range of BTS and hence received signal level decreases. The error rate may increase due to increased interference. This will degrade the quality of the radio link. > 1. Intra-cell handover ‘This handover is performed to If the traffic in one cell is too high then some MSs may be shifted to other cell if possible. This is known as load balancing, MS regularly performs check of 16 strongest carrier transmitting the BCCH. Out of this six strongest catriers are transmitted to currently assigned BS after every 0.48 seconds, BS also checks for the interference levels of the free time slots. OSS subsystem monitors the current traffic loads of the cell. ‘These are the measurement values which are used in handover mechanisms in GSM. ‘Typically it is expected that handover should finish in cone second, If the handover error occurs the connection is overtaken by previous BS. This section refers to typical situations of handovers in GsM ‘Situations of handovers ings 1. Intra-cell handover 2, Intra-cel,intra-BSC handover ‘3 Inter-BSC, Intra-MSC handover 4, Inter MSC handover it e15Fig. 1.10.2 : Situations of handovers in GSM optimize the traffic load and to improve quality of the connection. Within a cell, transmission at certain carrier frequencies become impossible due to narrowband interference and hence carrier frequency is changed i.e. handover is performed for improvement, Refer Fig. 1.10.3. BSC he 12 Bsc}! BSC MSC BTS (6816Fig. 1.1033 : Intra-cell handover (MSBTE-New Syllabus w.e.f academic year 2019-20) (D6-15) [a rech-Neo Publications ..A SACHIN SHAH Venture bile Network (MSBTE-6tN — Wireless and M 2 When the MS moves from one to another cell but both the of same Intra-BSC handover Inter-cell, cell cells are under control BSC then this type of handover is performed and MS is allocated with new carrier in new cell. Refer Fig. 1.10.4. gornFig. 1.104 Inter-cell, Intra-BSC handover > 3, Inter-BSC, Intra-MSC handover This is performed when mobile moves from one eell to another which are under control of dif MSC. Refer Fig. 1.10.5. fferent BSCs but sa (so1aFig. 1.10. Inter-BSC, Intra-MSC > 4, Inter MSC handover This is performed when MS is mi from one MSC area to dint for ioving fi pe rom one MSC area to another. In this situation both the MSCs hi rf . as to per (S19 ig. 1.10.6 : Inter MSC hand, (MSBTE-New Syllabus w.ef academic year 2019-20) (06-15) Tech-Neo Pu iblications ~A SACHIN SHAH Venture Jess and Mobile Network (MSBTE IF) DB 1.10.4 Security In GSM (Authentication and Privacy in GSM) GQ. Write short notes or GSM. Authentication and privacy in. GQ. Explain in detail how Subscriber Authentication is done GSM. * Inany of the digital cellular systems, security provision is relatively easy compared to analog systems. Methods like encryption, scrambling, FEC etc. can be employed to ensure security in the system, * GSM offers several security services based on the information stored in AUC and SIM. The security services offered by GSM are ‘Security services 1. Access control and authentication 2. Confidentiality ‘3, Anonymity (onFig. 1.10.7 : Security services > 1. Access control and authentication ‘Access to the GSM network is allowed only through user authentication process. For this first user needs to have valid PIN to access the SIM and then using challenge response scheme authentication is done in ‘mobile originated and mobile terminated calls. > 2. Confidentiality Once the authentication is done all the user data, voice etc, are encrypted to provide confidentiality. It exists only between MS and BTS. > 3. Anonymity ‘+ User's real identity is never transmitted on air. Every user is allocated with TMSI which is unique for each call. And VLR can change TMSI at any time, © These three services are achieved by three algorithms in GSM network. 1... AB algorithm for authentication (MSBTE-New Syllabus w.e academic year 2019-20) (D6-15) msc 2, AS algorithm for encryption 3. AB algorithm for generation of a cipher key 1.10,4(A) Authentication using A3 Algorithm Authentication is done with the help of SIM. SIM stores authentication key Ki and the user IMSI. Authentication is done by challenge response or request response method between MS and BTS. RAND random number is generated by AC (access control) which acts as a challenge and SIM responds to it by SRES (signed response). AUC generates RAND, SRES and cipher key K, for each IMSI received and then forwards this to HLR. VLR may ask for these values from HLR. ‘This RAND is sent to SIM by VLR for authentication purpose. ‘On network side as well as on SIM side algorithm A3 is carried out on the RAND and Ki. Then MS sends SRES generated by SIM on air and VLR compares this, received value with the one generated in the network. If both the values matches, subscriber is allowed to access the network otherwise he is denied the access. Refer Fig. 1.10.8. a) mobile network RAND {RAND Kj aoa] feos ed om = eres sis | es (¢221)Fig. 1.10.8 : Subscriber's authentication using A3 algorithm [al rech-Neo Publications ..A SACHIN SHAH Venture Basics of PCS and GSI Wireless and Mobile Network (MSBTE-6th — IF) PO.No. (1 Ye. 1.10.4(B) Data Encryption usin [All the user information is always encrypred European standard, Only manufactur «Entire encryption is bi © 64 bit Cipher key Ky is gener K, and RAND. This is done by A8 alg «Now encryption and decrypt Based on K,, current TDMA frame number, cers of the cellular devi ‘ased on encryption key or eipher key ated using the values already SIM has rithm, SIM and Network both calculates K, based on these values. con is carried out using As algorithm and Ke, As algorithm generates 114 bits. Thes the information bits inthe normal GSM burst and then its transmitted. Same operation is carried at the network sg data has no errors the modulo 2 addition of the received data ang g AS and AB Algorithm hefore itis sent on air, For encryption As algorithm is used whic, i ices has access to this algorithm K which is never sent on air to maintain secrecy, (received during authentication process) whig ¢ 114 bits are then modulo 2 ad, the received Normal burst, If the received al data sequence. This is decryption process. Refer Fig. 1.10.9. generated encrypted data gives out the origin SIM card «| yee AB TDMA trame number AS ‘Mobile phone Radio channel ” Network RAND TDMA me number (se22)Fig. 1.10.9 : Data encryption using AS and A8 algorithms 110.5 + Handover is related to the moving from one point to another point within the same network. When the movement is in another network occurs, it is known as Roaming roaming. * The mobile must register on the new netw Le fork with its + IMSI attach : IMS! is communicated to the new network. First location update message is conveyed t new VLR. This is then conveyed to HLR. Once the C : e subscriber is authenticated, his record is deleted fr the old VLR. om Roaming allows MS movement s seamlessly across Bown ly across sree Maw Gvilabus w.ef academic vear 2019-2m ine-16. Location updating of the MS is done with the help: MSC, VLR and HLR. HLR is given the informa about the SS7 address of the new VLR. If * subscriber is entitled to the service, the HLR sents! subset of the subscriber's information needed for control to the new VLR and old VLR registratio™ cancelled, Roaming is of two types namely horizontal roa and vertical roaming. Horizontal roaming: It is between two networks same family. For e,g, GSM to GSM roaming. me Foaming: It is between two networks of ifferent families. For e.g. GSM to CDMA roam Wireless and Mobile Network (MSBTE-6th — IF) tet NETWORK SIGNALING cM Un Avs A Mt ws BTS 1 BSC 1 MSC Ls i i ‘Tom ou |! i \ wm |e { ‘ [aa AR ; i | Jassae t 1 An | | aioe ‘| sz 2] LAPDm LAPDm aro] \[ APO] waro || taro | $7 | Aad a vaso |{[reao [rom |i [pow | rom | | [Pom U1 | interface interface 16164 Koils 64 vols! t 2,048 MoUs! Uni ie alr interface (genFig. 1.11.1: Protocol architecture for GSM signalling showing various radio interfaces ‘There are three different interfaces present in GSM system they are : 1. Uyy: Interconnection between MS and BTS 2. Agig Interconnection between BTS and BSC 3, A: Interconnection between BSC to MSC W111 Um Interface «In GSM network the interconnection between the different subsystems are connected via wireless channels. Signal processing through wireless channels has to undergo various regulations and standards are set vp for that © The radio interface between MS and base transceiver station is known as Um radio interface. «The GSM radio interface depends on TDMA (Time Division Multiple Access), FDD (Frequency Division Duplexing). [TDMA : frequency is shared among different users by dividing the time in slots. FDD : it allows the use of two different frequencies for uplink ie. from MS to BTS and downlink ie. BTS to MS.} © Three layers : 1. Physical layer (L1) 2, Link access Protocol on D channel modified (LAPDm) (L2) 3... The network layer (L3) (MSBTE-New Syllabus w.e academic year 2019-20) (D6-15) BTS (s80)Fig, 1.11.2: Um interface protocol 1 Layer 1: The physical layer Functions Formation of bursts in 5 different formats. Formation of TDMA frame by multiplexing of bursts. ‘Synchronisation with BTS with timing advance technique. Monitoring the quality of channel on the downlink path ‘Identification of idle channels. Interfacing to the data Tink layer and radio resource ‘management sublayer for traffic management. Eneryption and decryption of data between MS and BSS using FEC (Forward Error Correction). Digital modulation with the use of GMSK modulation scheme. Layer 2: LAPDm layer ‘This is based on ISDN LAPD protocol. Functions 1 2. 3. 4 Reliable data transfer between GSM network and MS. Arrangement of sequencing of data frames: Flow control. ‘Segmentation and reassembly of the data, -Tech-Neo Publications ...A SACHIN SHAH Venture Wit ireless and Mobile Network (MSBTE: LAPDm has to follow frame structures as there is no buffering between layer 1 and layer 2 in Um. S$ Layer 3: The network layer It consists of three sublayers : 3. 1 2 a - 1. 2. 3. RR : Radio Resource Management Sublayer MM : Mobility Management Sublayer CM : Call Management Sublayer RR It is used for setup, maintenance and disconnection of radio channels. It can directly access the physical layer and provides reliable communication path for upper layers. MM It supports the functions of location updating, authentication and encryption, allocation of TMSI. It also supports reliable connection to upper layer, cM Tt consists of three functional entities namely : Call control (CC) : Support for end to end call setup and management, SMS (Short Message Service) : Transfers and manages SMS services. Supplementary service (SS) : Manages supplementary service, 1.11.2 Ay, Interface 1t provides the interface between BTS and MSC. Functions Radio channel management. Traffic channel management, Terrestrial channel management, 1 supports two different links : 64 Kbps link (full rate or half rate Carrying speech or user data) 16 kbps link (control inform: tation link between BSC. BTS and BTS-Msc) a 3. Basics of PCS and GSM...Pg. No, Three layers are present in thi 1, The physical layer + modulation purposes. The LAPD layer Network layer - RR’ is used, it is omly par y radio resource “management sublayer. Al) functions of RR’ are supported by BTsy (BTS management). typically uses Poy 5, 2 3. Transparent messages and non transparent message, between MS and BSC/MSC are handled by the traf ‘management. Transparent messages : BTS analysis is not required ‘Non-transparent messages : BTS analysis is required, 1.11.3 A Interface It provides the interconnection between BSS and MSc. ‘SS7 is used for communication between MS and MSC. This interface supports identification of channel timeslots being serviced by BSS. ‘The messaging required within the network to enabh handover etc to be undertaken is carried over th interface, 1.11.4 Interfaces used within NSS B Interface Itinterconnects MSC and VLR. It is interface, Protocol used : MAP/B protocol. Tt is used to access data Tegarding MS located in MSt area, purely an intern: C interface Ttinterconnects HLR and GMsc, Protocol used : MAP/C The MSC may o ptionally forward billing informatio to the HLR aft fer the call is completed and clear D Interface Minterconnects HLR and VLR. Prot MAP/D (MSBTE-New Syllabus wet academic year 2019-20) (9 15) ae Wireless and Mobile Network (MSBTE-6th IF) 1t supports functions like exchange of the data related to the location of the ME and to the management of the subscriber. ‘The communications along this interface are used to confirm the status of the IMEI of the ME gaining ‘access to the network, 4, E Interface 6. G interface ‘*_Itinterconnects two MSCs. © Itinterconnects two VLRs of different MSCs. © Protocol used : MAP/E © Protocol used : MAP/G «The E interface exchanges data related to handover | + It is used to access subscriber information. e.g. during a between two MSCs. location update procedure, 5. Finterface 7. Hinterface © Itinterconnects MSC and EIR. # Itinterconnects MSC and SMSC (SMS center). * Protocol used : MAP/F. ‘* Protocol used : MAP/H ‘Iti used to support SMS services. 8. Tinterface Itinterconnects MSC and ME. Itis used for exchange of transparent messages. Refer Fig. um 11.3, it shows all the radio interfaces used in GSM architecture. terface Abis Aintertaco BTS : (609Fig. 1.113 : GSM architecture showing radio interfaces between various functional entities «Chapter Ends goo

You might also like